Research Reports

This Javascript highlights what section of the main navigation you are on and unlinks its URL.

Examples of Easy-to-implement, Widely Used Methods of Masking for
which Analytic Properties are not Justified

William E. Winkler

KEY WORDS: Data Quality, Re-identification

ABSTRACT

This paper provides examples that illustrate the severe analytic distortions of many
widely used masking methods that have been in use for a number of years. The masking
methods are intended to reduce or eliminate re-identification risk in public-use files.
Although the masking methods yield files that do not allow reproduction of the analytic
properties of original, confidential files, in a number of situations they sometimes allow
small amounts of re-identification using elementary methods and widely available
software.

This symbol indicates a link to a non-government web site. Our linking to these sites does not constitute an endorsement of any products, services or the information found on them. Once you link to another site you are subject to the policies of the new site.